Securing Media Hotspots
暂无分享,去创建一个
[1] Simon Heron,et al. Encryption: Advanced Encryption Standard (AES) , 2009 .
[2] Wenbo Mao,et al. Modern Cryptography: Theory and Practice , 2003 .
[3] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[4] Leslie Lamport,et al. The temporal logic of actions , 1994, TOPL.
[5] Tongtong Li,et al. Physical layer built-in security enhancement of DS-CDMA systems using secure block interleaving , 2004 .
[6] Tongtong Li,et al. Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems , 2007, EURASIP J. Wirel. Commun. Netw..
[7] Miguel R. D. Rodrigues,et al. Information Theoretic Security for Wireless Channels-Theory and Practice , 2007 .
[8] Sebastian Mödersheim,et al. OFMC: A Symbolic Model-Checker for Security Protocols , 2004 .
[9] Khaled Masmoudi,et al. Efficient Group Management For Inter-PN Access Control , 2007, 2007 IEEE International Conference on Communications.
[10] Frédéric Lassabe,et al. Refining WiFi Indoor Positioning Renders Pertinent Deploying Location-Based Multimedia Guide , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[11] Christian Gehrmann,et al. Manual authentication for wireless devices , 2004 .
[12] Michael K. Reiter,et al. Seeing-is-believing: using camera phones for human-verifiable authentication , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[13] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[14] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[15] Tongtong Li,et al. CDMA physical layer built-in security enhancement , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[16] Zihua Guo,et al. Piconet security in IEEE 802:15.3 WPAN , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[17] J. Baylis. Error-correcting Codes , 2014 .
[18] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[19] Howard M. Heys. Analysis of the Statistical Cipher Feedback Mode of Block Ciphers , 2003, IEEE Trans. Computers.
[20] Aaron Earle. Wireless Security Handbook , 2005 .
[21] Sebastian Mödersheim,et al. OFMC: A symbolic model checker for security protocols , 2005, International Journal of Information Security.
[22] Wenyuan Xu,et al. Securing wireless systems via lower layer enforcements , 2006, WiSe '06.
[23] Frédéric Lassabe,et al. A Friis-based calibrated model for WiFi terminals positioning , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.
[24] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[25] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..